State of Endpoint Security:

A pen-testers perspective on malware & ransomware attack techniques

Over the past few years major crimeware, ransomware and malware campaigns have moved to fileless — playing upon features built directly into popular word processing and document rendering applications, email clients, and functionalities of the Operating System itself as a means to attack and spread.

Learn more on:

  • Insights into how these common in-place applications are abused to initiate or further attacks
  • How techniques such as these can lead to malware/ransomware bypassing A/V
  • Strategies for re-evaluating your endpoint security tools


Jake Williams

Analyst, SANS Institute

Jack Danahy

CTO, Barkly

Watch now